Section 11.12 Linuxconf via TCP Port 98

   


11.12 Linuxconf via TCP Port 98

graphics/threedangerlevel.gif

Linuxconf is a GUI-based configuration tool for Linux that allows the SysAdmin to configure things such as networking and printer services. Besides root being able to start it via the command linuxconf it offers http requests via TCP port 98. It is nicely implemented, easy to use, and has a format similar to recent Windows-based configuration tools to ease people's transition to Linux. On all known distributions, by default Linuxconf is configured not to listen on this port so this vulnerability can happen only if you alter this default.

Table 11.1. Promiscuous Variations

Driver File

Message

3c515.c

printk("%s: Setting promiscuous mode.\n", dev->name);

3c59x.c

printk(KERN_NOTICE "%s: Setting promiscuous mode.\n", dev->name);

82596.c

printk("%s: set multicast list, %d entries, promisc %s, allmulti %s\n", ...

ariadne.c and at1700.c

printk("%s: Promiscuous mode enabled.\n", dev->name);

atarilance.c and batetlance.c

DPRINTK( 1, ( "%s: Promiscuous mode enabled.\n", dev->name ));

eepro.c

printk("%s: promiscuous mode enabled.\n", dev->name);

epic100.c

printk(KERN_INFO "%s: Promiscuous mode enabled.\n", dev->name);

lance.c

printk("%s: Promiscuous mode enabled.\n", dev->name);

ni5010.c

PRINTK((KERN_DEBUG "%s: Entering promiscuous mode\n", dev->name));

ni52.c

printk("%s: switching to promisc. mode\n",dev->name);

pcnet32.c

printk("%s: Promiscuous mode enabled.\n", dev->name);

rtl8139.c, sis900.c, via-rhine.c, and yellowfin.c

printk(KERN_NOTICE"%s: Promiscuous mode enabled.\n", dev->name);

tulip.c

printk(KERN_INFO "%s: Promiscuous mode enabled.\n", dev->name);


However, root can enable it to accept requests on port 98 from whatever system or network is specified. Once this is done no password is required to make any desired changes. Certainly, the program cannot detect whether the person interacting with it from that remote system is root so this is a vulnerability unless all users on such a system are trusted. Additionally, this leaves the system open to IP address spoofing, which is discussed in "Packet Spoofing Explained" on page 239.

Next, for some operations, it will request root's password. Because it is using http rather than https, this password will be transmitted over the network in clear text. This makes root's password vulnerable to sniffing. Lastly, recent reports indicate another possible vulnerability in Linuxconf when it is listening on TCP port 98. This vulnerability has not been proven at this time.

Because of these problems, it is recommended that network access be disabled except on protected networks. Additionally, it is recommended that the organization's firewall block requests to TCP port 98 coming in from the Internet for an added "Ring of Security" protection.


   
Top


Real World Linux Security Prentice Hall Ptr Open Source Technology Series
Real World Linux Security Prentice Hall Ptr Open Source Technology Series
ISBN: N/A
EAN: N/A
Year: 2002
Pages: 260

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net